CIA Triad/SNORT/Defensive Measures Flashcards

(54 cards)

1
Q

assurance that sensitive information can only be read/interpreted by people/processes that are authorized to

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

assurance that authorized users can access/work with information assets, resources when needed with sufficient response and performance.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

assurance that information remains correct and authentic, protected by means of preventing/detecting unauthorized creation, modification and destruction of information.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of a threat-source?

A

Natural (Hurricane), human (internal/external).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

flaw that can present a security breach

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

safeguards/countermeasures to reduce risk

A

management controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the goal of risk management? How can it be accomplished?

A

to reach zero risk and it can be accomplished by eliminating the threat or the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four approaches when planning additional defensive measures?

A

Uniform Protection, Protected Enclaves, Information Centric, Vector-Oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Centric and Vector are typically used when creating new networks. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uniform Protection and Protected Enclaves are typically used when creating new enterprise networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

defensive approach when all internal hosts receive same level of protection

A

Uniform Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

defensive approach when you subdivide the internal network (subdivide and separate networks) so it isn’t one large zone with no internal protections

A

Protected Enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

where the client (supplicant) must pass muster with the networks policy server before getting to the resources on the network

A

Network Admissions Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do we use firewalls?

A

to isolate or split up groups and sensitive data from everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In order to travel from one VLAN to another, what do you have to pass through?

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VPNs can give you two things. What are they?

A

confidentiality and ability that only hosts that are authorized to connect to other hosts to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

defensive measure that prioritizes protection of information over systems

A

Information Centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The goal of information centric is to protect the information regardless of where the information is. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

fast, flexible, open-source Network Intrusion Detection System developed in 1998,

A

SNORT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Snort is not rule-based. (T or F)

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Snort looks at all traffic over IP and sniffs both traffic in both directions. (T or F)

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three main operational modes when using Snort? How are they configured?

A

Sniffer, Packet Logger, Network Intrusion Detection System (NIDS).

They are configured via command line switches.

23
Q

Snort operational mode that logs all data and post-process to look for anomalous activity

A

Packet Logger

24
Q

Snort operational mode that can perform portscan detection, ip defrag, app layer analysis

25
This is used to set the operational configuration of Snort (what to log, what to alert on, what rules to include/location, setting substitution variables?)
snort.conf file
26
Default path of snort.conf
/etc/snort/snort/snort.conf
27
The three types of variables in snort.conf
var, portvar, ipvar
28
Why is setting correct values in variables important?
reduce "false-positive" alerts
29
plug-in tools that allow Snort to look for certain criteria in a packet after it has been decoded but before it is put through the detection engine
Snort Preprocessors
30
set of instructions designed to pick out network traffic that matches a specified pattern, then takes chosen action when traffic matches (Snort)
Rule
31
Most Snort rules are written in a single line. (T or F)
T
32
the two sections of Rules
rule header and rule options
33
alert messages and parts of packet inspected to determine further rule action or not (A Snort Rules Section)
Rule Options
34
action, protocol, source and destination ports and IP addresses (a Snort Rules section)
Rule Header
35
alert tcp any any -> 192.168.1.0/24 80 . Would this be the rule options or rule header?
Rule Header because it contains ip address and destination
36
alert, log, pass, activate and dynamic. which mode is this? (snort rule actions)
detection mode
37
ignore the packet (detection mode)
pass
38
alert and then turn on another dynamic rule (detection mode)
activate
39
drop, reject and sdrop. which mode is this? (snort rule actions)
inline mode
40
make iptables drop packet but do not log (inline mode)
sdrop
41
make iptables drop packet, log and send tcp reset if protocol is tcp (icmp port msg if protocol is UDP) - inline mode.
reject
42
four major categories of rule options
general, payload, non-payload, post-detection
43
provides information about the rule but do not have any effect during detection (Snort rule options)
general options
44
looks for data inside packet payload, can be inter-related (Snort rule options)
payload
45
rule specific triggers that happen after a rule has "fired" (Snort rule options)
post-detection
46
tells logging and alerting engine that the message to print with packet dump or to an alert (Snort rule options)
msg rule option
47
allows rules to include references to external identification systems (could reference bugtraq, cve, or URLs) . (Snort rule options)
reference keyword
48
external attack ID systems
BID and CVE
49
<100 means what? (Snort Rule Options Keywords)
reserved for future use
50
100-1,000,000 means what? (Snort Rule Options Keywords)
rules included with the Snort distribution
51
> 1,000,000 means what? (Snort Rule Options Keywords)
used for local rules
52
what keyword would you use to uniquely identify Snort rules? (hint: three letter word)
sid
53
PHP-based analysis engine to search and process database of security events (various IDSs, firewalls, and network monitoring tools)
Basic Analysis and Security Engine (BASE)
54
In order for BASE to work, you must periodically do what?
refresh the screen